Alex Stanev
Alex Stanev
Thanks for your contribution! Hope this is not against Colab's terms of usage. Will keep this open for now, so other users can see it.
It's strange you're seeing difference for straight dictionary attack with -S. wpa-sec returns always same ESSID "hashes", so we can do PBKDF2-SHA1 just once. Can you share hashcat status output...
So it looks like adding -S in our case makes things a bit slower for our workload. Will leave this open and will get back to it after core rewrite...
This is currently not implemented. Once uploaded, the hashes are released to crackers and you may consider them leaked already. Best is to change the WIFI key of the networks...
Agreed for the mess, but I have issues with our compressed dicts - hashcat just don't decompress them when I last tried. Did you tried with our dicts? What's the...
Will take a look at hashcat's decompress code to see what happens. For John we still have to decompress the dicts.
Found the gz issue in hashcat and submitted a PR hashcat/hashcat#2668
Hi, this is result from certificate expiration: https://letsencrypt.org/docs/dst-root-ca-x3-expiration-september-2021/ Removed the old root not to be sent by the server, please check again, now should be working fine.
There is no cache involved, try to update root certificates.
The expired certificate is the one, that was cross-signed root of LE. Don't have windows machine to reproduce (assume this is the platform?). The active LE certs are here: https://letsencrypt.org/certificates/...